MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 669247f973870da293e534e1dfad8ca9327cf2623cc5dc108fca05b7e0d701b2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 13
| SHA256 hash: | 669247f973870da293e534e1dfad8ca9327cf2623cc5dc108fca05b7e0d701b2 |
|---|---|
| SHA3-384 hash: | f23ecfbdaf8f8c0f4f8e1fa6411ed593cb41cad0efe7360eb04cde01243d244d31d1390c63eca1879b3daa353496a59b |
| SHA1 hash: | 892fbfea232384e2cc12890d0823a41b6c2f5850 |
| MD5 hash: | 2b5c1f4495e220401f03e1b31c83b33a |
| humanhash: | bakerloo-white-venus-kitten |
| File name: | 2b5c1f4495e220401f03e1b31c83b33a |
| Download: | download sample |
| Signature | Loki |
| File size: | 336'384 bytes |
| First seen: | 2022-01-21 11:31:41 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0152c21ced523378d45e83b1b3a1fdf0 (1 x Loki, 1 x RedLineStealer, 1 x ArkeiStealer) |
| ssdeep | 6144:mGAnrZrnCHCnv1Uyg/XFzVSv4qSQ2lfc8WvLetnI9J:mGEZco9Dg/RVSvWQ2RXyD |
| Threatray | 6'082 similar samples on MalwareBazaar |
| TLSH | T1F3647C10BBA0C435E5B311F459B9937CA53E7AB16B2491CB63E12AED5B356E0EC3031B |
| File icon (PE): | |
| dhash icon | 2dec1378399b9b91 (25 x Smoke Loader, 22 x RedLineStealer, 7 x RaccoonStealer) |
| Reporter | |
| Tags: | 32 exe Loki |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifcats observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | Lokibot |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.lokipws. |
| Rule name: | XOREngine_Misc_XOR_Func |
|---|---|
| Author: | smiller cc @florian @wesley idea on implementation with yara's built in XOR function |
| Description: | Use with care, https://twitter.com/cyb3rops/status/1237042104406355968 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://103.170.255.45/intel087(R)/.csrss.exe